Search results for: political theory
5413 A Quantitative and Exploratory Study of the Changing Ideals and Challenges Involving the Modern Olympic Movement
Authors: Ram Dayal
Abstract:
Since inception of the modern Olympic Games in 1896 in Athens, Greece, it has undergone a paradigm shift over a period of more than a century. It originated with the purpose of inculcating physical and moral qualities, sense of aesthetics, ethical and spiritual value and educating young people, through the spread of the philosophy of amateurism, which is free from the vices of racial discrimination, any country’s domination, corruption, doping menace and political interference. Now, it has metamorphosed into the arena where only professionalism matters and has been reduced to the show of strength for countries analogous to the cold war. Rather than spirit of sports, the economics of sports is the more relevant underpinning. Changes in medal tally over a period of time and its correlation with the changing geo-political structure have been evaluated quantitatively using regression analyses, which have yielded statistically significant relationship among variables. The present study also tries to explore this shift in Olympic spirit through historical approach, using books, thesis, dissertations, articles, related documents. The present study will help evaluate the Olympic ideals with modern perspective and the need to replace or reinstall the same in order to nurture and rejuvenate the modern Olympic movement.Keywords: challenges, games, olympic, sports
Procedia PDF Downloads 2265412 Reframing Service Sector Privatisation Quality Conception with the Theory of Deferred Action
Authors: Mukunda Bastola, Frank Nyame-Asiamah
Abstract:
Economics explanation for privatisation, drawing on neo-liberal market structures and technical efficiency principles has failed to address social imbalance and, distribute the efficiency benefits accrued from privatisation equitably among service users and different classes of people in society. Stakeholders’ interest, which cover ethical values and changing human needs are ignored due to shareholders’ profit maximising strategy with higher service charges. The consequence of these is that, the existing justifications for privatisation have fallen short of customer quality expectations because the underlying plan-based models fail to account for the nuances of customer expectations. We draw on the theory of deferred action to develop a context-based privatisation model, the deferred-based privatisation model, to explain how privatisation could be strategised for the emergent reality of the wider stakeholders’ interests and everyday quality demands of customers which are unpredictable.Keywords: privatisation, service quality, shareholders, deferred action, deferred-based privatisation model
Procedia PDF Downloads 2745411 Sororicide in the Forbidden City: Women Oppressing Each Other in the Chinese TV Drama “The Legend of Zhen Huan”
Authors: Muriel Canas-Walker
Abstract:
The 2012 TV series "The Legend of Zhen Huan" is one of the most popular and influential historical dramas on Chinese television and is regularly discussed on Chinese social media such as Weibo. Set in the Qing dynasty, the 76 episodes series features palace intrigues focused on female characters. In the Forbidden City, concubines must survive the cruelty of an extreme polygamy system, constantly competing against each other. The patriarchal oppression of the women sequestred in the harem relies on fierce female competition and does not leave much room for compassion. Using Michel Foucault’s theory of power, feminist theories, and visual anthropology, this paper analyzes the complex relationships between the female characters, from their rise to power to their fall from grace, from alliances to betrayals, from sorority to sororicide. This analysis aims to understand what makes this series particularly popular with young female audiences in China and explain its importance in Chinese media.Keywords: Chinese TV Drama, feminism, popular culture, Theory of Power
Procedia PDF Downloads 1935410 Understanding Cyber Kill Chains: Optimal Allocation of Monitoring Resources Using Cooperative Game Theory
Authors: Roy. H. A. Lindelauf
Abstract:
Cyberattacks are complex processes consisting of multiple interwoven tasks conducted by a set of agents. Interdictions and defenses against such attacks often rely on cyber kill chain (CKC) models. A CKC is a framework that tries to capture the actions taken by a cyber attacker. There exists a growing body of literature on CKCs. Most of this work either a) describes the CKC with respect to one or more specific cyberattacks or b) discusses the tools and technologies used by the attacker at each stage of the CKC. Defenders, facing scarce resources, have to decide where to allocate their resources given the CKC and partial knowledge on the tools and techniques attackers use. In this presentation CKCs are analyzed through the lens of covert projects, i.e., interrelated tasks that have to be conducted by agents (human and/or computer) with the aim of going undetected. Various aspects of covert project models have been studied abundantly in the operations research and game theory domain, think of resource-limited interdiction actions that maximally delay completion times of a weapons project for instance. This presentation has investigated both cooperative and non-cooperative game theoretic covert project models and elucidated their relation to CKC modelling. To view a CKC as a covert project each step in the CKC is broken down into tasks and there are players of which each one is capable of executing a subset of the tasks. Additionally, task inter-dependencies are represented by a schedule. Using multi-glove cooperative games it is shown how a defender can optimize the allocation of his scarce resources (what, where and how to monitor) against an attacker scheduling a CKC. This study presents and compares several cooperative game theoretic solution concepts as metrics for assigning resources to the monitoring of agents.Keywords: cyber defense, cyber kill chain, game theory, information warfare techniques
Procedia PDF Downloads 1405409 New Media and Deliberative Democracy in Malaysia
Authors: Rosyidah Muhamad
Abstract:
This article seeks to access the democratic implication of new media in Malaysia through three important key points of deliberative democracy; information access, rational critical deliberation and mechanism of vertical accountability. The article suggests that the Internet is expanding political opportunity in which contributed to a more diverse discourse. It is depending on how users used it; for democratic or non-democratic outcome. The Internet has been a key instrument in exposing human rights abuse, corruption, organizing protests and mobilizing voters during election campaigns. It therefore pushes for transparency and accountability and thus increasing the rise of deliberative democracy in Malaysia. While there are some elements of an emerging deliberative politics, it is also clear that the Malaysian online political discourse is acting as moderate forms of discourse as the sphere increasingly exist in a chaotic and diversified online discourse. Yet, the online sphere still allows citizens to discuss public affairs. When the public opinion is strong enough, it can influence public policies to ensure that they reflect the public interest. It is suggesting an increased space of negotiation and contestation among the previously muzzled offline situation. This is a big step in the progress democracy in Malaysia.Keywords: Keywords: New Media, democratization, deliberative democracy, Malaysian politics
Procedia PDF Downloads 3005408 Nonlinear Modelling of Sloshing Waves and Solitary Waves in Shallow Basins
Authors: Mohammad R. Jalali, Mohammad M. Jalali
Abstract:
The earliest theories of sloshing waves and solitary waves based on potential theory idealisations and irrotational flow have been extended to be applicable to more realistic domains. To this end, the computational fluid dynamics (CFD) methods are widely used. Three-dimensional CFD methods such as Navier-Stokes solvers with volume of fluid treatment of the free surface and Navier-Stokes solvers with mappings of the free surface inherently impose high computational expense; therefore, considerable effort has gone into developing depth-averaged approaches. Examples of such approaches include Green–Naghdi (GN) equations. In Cartesian system, GN velocity profile depends on horizontal directions, x-direction and y-direction. The effect of vertical direction (z-direction) is also taken into consideration by applying weighting function in approximation. GN theory considers the effect of vertical acceleration and the consequent non-hydrostatic pressure. Moreover, in GN theory, the flow is rotational. The present study illustrates the application of GN equations to propagation of sloshing waves and solitary waves. For this purpose, GN equations solver is verified for the benchmark tests of Gaussian hump sloshing and solitary wave propagation in shallow basins. Analysis of the free surface sloshing of even harmonic components of an initial Gaussian hump demonstrates that the GN model gives predictions in satisfactory agreement with the linear analytical solutions. Discrepancies between the GN predictions and the linear analytical solutions arise from the effect of wave nonlinearities arising from the wave amplitude itself and wave-wave interactions. Numerically predicted solitary wave propagation indicates that the GN model produces simulations in good agreement with the analytical solution of the linearised wave theory. Comparison between the GN model numerical prediction and the result from perturbation analysis confirms that nonlinear interaction between solitary wave and a solid wall is satisfactorilly modelled. Moreover, solitary wave propagation at an angle to the x-axis and the interaction of solitary waves with each other are conducted to validate the developed model.Keywords: Green–Naghdi equations, nonlinearity, numerical prediction, sloshing waves, solitary waves
Procedia PDF Downloads 2855407 The Effects of Cost-Sharing Contracts on the Costs and Operations of E-Commerce Supply Chains
Authors: Sahani Rathnasiri, Pritee Ray, Sardar M. N. Isalm, Carlos A. Vega-Mejia
Abstract:
This study develops a cooperative game theory-based cost-sharing contract model for a business to consumer (B2C) e-commerce supply chain to minimize the overall supply chain costs and the individual costs within an information asymmetry scenario. The objective of this study is to address the issues of strategic interactions among the key players of the e-commerce supply chain operation, which impedes the optimal operational outcomes. Game theory has been included in the field of supply chain management to resolve strategic decision-making issues; however, most of the studies are limited only to two-echelons of the supply chains. Multi-echelon supply chain optimizations based on game-theoretic models are less explored in the previous literature. This study adopts a cooperative game model to focus on the common payoff of operations and addresses the issues of information asymmetry and coordination of a three-echelon e-commerce supply chain. The cost-sharing contract model integrates operational features such as production, inventory management and distribution with the contract related constraints. The outcomes of the model highlight the importance of maintaining lower operational costs by all players to obtain benefits from the cost-sharing contract. Further, the cost-sharing contract ensures true cost revelation, and hence eliminates the information asymmetry issues among the players. Comparing the results of the contract model with the de-centralized e-commerce supply chain operation further emphasizes that the cost-sharing contract derives Pareto-improved outcomes and minimizes the costs of overall e-commerce supply chain operation.Keywords: cooperative game theory, cost-sharing contract, e-commerce supply chain, information asymmetry
Procedia PDF Downloads 1285406 Translators as Agents: Jewish Translators and Zsolnay Publishing House’s Translational Culture in Pre-Anschluss Austria,1924-1938
Authors: Tatsiana Haiden
Abstract:
The role of the translator in the publishing process has been underestimated for centuries. Any translation is produced in a certain socio-political context by agents with different background, interests, and opinions, i.e., no translation is neutral. Any translation goes beyond the text; it is not only an interlingual transfer of signs but a social phenomenon. The case study shows how Jewish social networks influence publishing translations and aims to explain the unexpected success of the Jewish publishing house in pre-Anschluss Austria. The research shows that translators play a central role (‘Translator’s visibility’ - Pym, ‘Activist turn’ - Wolf, ‘Translator studies’ - Chesterman) in choosing what has to be translated and establishing communication between the author and the publisher. The concept of Translationskultur of Prunc is being historized and applied to the publishing house for the first time by analyzing business correspondence between the main actors of translation (publisher-translator-author). The translation studies project has become interdisciplinary –it encompasses sociology (concepts of Bourdieu’s ‘Field theory’ are used) and history. The historical research method Histoire croiseé is being used to avoid subjectivity and to introduce a new ‘translator-oriented’ vision in translation studies instead of the author-oriented one. In the course of the archival research, it was established that Jewish background plays an essential role in the destiny of the translators and the publishing house, so the Jewish studies have been added to the project. The study goes beyond the Austrian translational culture; it can be used as an example of dealing with publishing houses policies, publishing translations, and translator studies.Keywords: history of translation, Jewish studies, publishing translations, translation sociology, translator studies, translators as actors
Procedia PDF Downloads 1575405 The Political Economy of Media Privatisation in Egypt: State Mechanisms and Continued Control
Authors: Mohamed Elmeshad
Abstract:
During the mid-1990's Egypt had become obliged to implement the Economic Reform and Structural Adjustment Program that included broad economic liberalization, expansion of the private sector and a contraction the size of government spending. This coincided as well with attempts to appear more democratic and open to liberalizing public space and discourse. At the same time, economic pressures and the proliferation of social media access and activism had led to increased pressure to open a mediascape and remove it from the clutches of the government, which had monopolized print and broadcast mass media for over 4 decades by that point. However, the mechanisms that governed the privatization of mass media allowed for sustained government control, even through the prism of ostensibly privately owned newspapers and television stations. These mechanisms involve barriers to entry from a financial and security perspective, as well as operational capacities of distribution and access to means of production. The power dynamics between mass media establishments and the state were moulded during this period in a novel way. Power dynamics within media establishments had also formed under such circumstances. The changes in the country's political economy itself somehow mirrored these developments. This paper will examine these dynamics and shed light on the political economy of Egypt's newly privatized mass media in the early 2000's especially. Methodology: This study will rely on semi-structured interviews from individuals involved with these changes from the perspective of the media organizations. It also will map out the process of media privatization by looking at the administrative, operative and legislative institutions and contexts in order to attempt to draw conclusions on methods of control and the role of the state during the process of privatization. Finally, a brief discourse analysis will be necessary in order to aptly convey how these factors ultimately reflected on media output. Findings and conclusion: The development of Egyptian private, “independent” mirrored the trajectory of transitions in the country’s political economy. Liberalization of the economy meant that a growing class of business owners would explore opportunities that such new markets would offer. However the regime’s attempts to control access to certain forms of capital, especially in sectors such as the media affected the structure of print and broadcast media, as well as the institutions that would govern them. Like the process of liberalisation, much of the regime’s manoeuvring with regards to privatization of media had been haphazardly used to indirectly expand the regime and its ruling party’s ability to retain influence, while creating a believable façade of openness. In this paper, we will attempt to uncover these mechanisms and analyse our findings in ways that explain how the manifestations prevalent in the context of a privatizing media space in a transitional Egypt provide evidence of both the intentions of this transition, and the ways in which it was being held back.Keywords: business, mass media, political economy, power, privatisation
Procedia PDF Downloads 2275404 Sensor Fault-Tolerant Model Predictive Control for Linear Parameter Varying Systems
Authors: Yushuai Wang, Feng Xu, Junbo Tan, Xueqian Wang, Bin Liang
Abstract:
In this paper, a sensor fault-tolerant control (FTC) scheme using robust model predictive control (RMPC) and set theoretic fault detection and isolation (FDI) is extended to linear parameter varying (LPV) systems. First, a group of set-valued observers are designed for passive fault detection (FD) and the observer gains are obtained through minimizing the size of invariant set of state estimation-error dynamics. Second, an input set for fault isolation (FI) is designed offline through set theory for actively isolating faults after FD. Third, an RMPC controller based on state estimation for LPV systems is designed to control the system in the presence of disturbance and measurement noise and tolerate faults. Besides, an FTC algorithm is proposed to maintain the plant operate in the corresponding mode when the fault occurs. Finally, a numerical example is used to show the effectiveness of the proposed results.Keywords: fault detection, linear parameter varying, model predictive control, set theory
Procedia PDF Downloads 2525403 Game-Theory-Based on Downlink Spectrum Allocation in Two-Tier Networks
Authors: Yu Zhang, Ye Tian, Fang Ye Yixuan Kang
Abstract:
The capacity of conventional cellular networks has reached its upper bound and it can be well handled by introducing femtocells with low-cost and easy-to-deploy. Spectrum interference issue becomes more critical in peace with the value-added multimedia services growing up increasingly in two-tier cellular networks. Spectrum allocation is one of effective methods in interference mitigation technology. This paper proposes a game-theory-based on OFDMA downlink spectrum allocation aiming at reducing co-channel interference in two-tier femtocell networks. The framework is formulated as a non-cooperative game, wherein the femto base stations are players and frequency channels available are strategies. The scheme takes full account of competitive behavior and fairness among stations. In addition, the utility function reflects the interference from the standpoint of channels essentially. This work focuses on co-channel interference and puts forward a negative logarithm interference function on distance weight ratio aiming at suppressing co-channel interference in the same layer network. This scenario is more suitable for actual network deployment and the system possesses high robustness. According to the proposed mechanism, interference exists only when players employ the same channel for data communication. This paper focuses on implementing spectrum allocation in a distributed fashion. Numerical results show that signal to interference and noise ratio can be obviously improved through the spectrum allocation scheme and the users quality of service in downlink can be satisfied. Besides, the average spectrum efficiency in cellular network can be significantly promoted as simulations results shown.Keywords: femtocell networks, game theory, interference mitigation, spectrum allocation
Procedia PDF Downloads 1565402 Study of the Buckling of Sandwich Beams Consider Stretching Effect
Authors: R. Bennai, H. Ait Atmane, H. Fourne, B. Ayache
Abstract:
In this work, an analytical approach using a refined theory of hyperbolic shear deformation of a beam was developed to study the buckling of graduated sandwiches beams under different boundary conditions. The effects of transverse shear strains and the transverse normal deformation are considered. The constituent materials of the beam are supposed gradually variable depending on the height direction based on a simple power distribution law in terms of the volume fractions of the constituents; the two materials with which we worked are metals and ceramics. The core layer is taken homogeneous and made of an isotropic material; while the banks layers consist of functionally graded materials with a homogeneous fraction compared to the middle layer. In the end, illustrative examples are presented to show the effects of changes in different parameters such as (material graduation, the stretching effect of the thickness, boundary conditions and thickness ratio-length) on the vibration free of an FGM sandwich beams.Keywords: FGM materials, refined shear deformation theory, stretching effect, buckling
Procedia PDF Downloads 1785401 A Sociocultural View of Ethnicity of Parents and Children's Language Learning
Authors: Thapanee Musiget
Abstract:
Ethnic minority children’s language learning is believed that it can be developed through school system. However, many cases prove that these kids are left to challenge with multicultural context at school and sometimes decreased the ability to acquire new learning. Consequently, it is significant for ethnicity parents to consider that prompting their children at home before their actual school age can eliminate negative outcome of children's language acquisition. This paper discusses the approach of instructional use of parents and children language learning in the context of minority language group in Thailand. By conducting this investigation, secondary source of data was gathered with the purpose to point out some primary methods for parents and children in ethnicity. The process of language learning is based on the sociocultural theory of Vygotsky, which highlights expressive communication among individuals as the best motivating force in human development and learning. The article also highlights the role of parents as they lead the instruction approach. In the discussion part, the role of ethnic minority parents as a language instructor is offered as mediator.Keywords: ethnic minority, language learning, multicultural context, sociocultural theory
Procedia PDF Downloads 3915400 Refined Procedures for Second Order Asymptotic Theory
Authors: Gubhinder Kundhi, Paul Rilstone
Abstract:
Refined procedures for higher-order asymptotic theory for non-linear models are developed. These include a new method for deriving stochastic expansions of arbitrary order, new methods for evaluating the moments of polynomials of sample averages, a new method for deriving the approximate moments of the stochastic expansions; an application of these techniques to gather improved inferences with the weak instruments problem is considered. It is well established that Instrumental Variable (IV) estimators in the presence of weak instruments can be poorly behaved, in particular, be quite biased in finite samples. In our application, finite sample approximations to the distributions of these estimators are obtained using Edgeworth and Saddlepoint expansions. Departures from normality of the distributions of these estimators are analyzed using higher order analytical corrections in these expansions. In a Monte-Carlo experiment, the performance of these expansions is compared to the first order approximation and other methods commonly used in finite samples such as the bootstrap.Keywords: edgeworth expansions, higher order asymptotics, saddlepoint expansions, weak instruments
Procedia PDF Downloads 2775399 Health Percentage Evaluation for Satellite Electrical Power System Based on Linear Stresses Accumulation Damage Theory
Authors: Lin Wenli, Fu Linchun, Zhang Yi, Wu Ming
Abstract:
To meet the demands of long-life and high-intelligence for satellites, the electrical power system should be provided with self-health condition evaluation capability. Any over-stress events in operations should be recorded. Based on Linear stresses accumulation damage theory, accumulative damage analysis was performed on thermal-mechanical-electrical united stresses for three components including the solar array, the batteries and the power conditioning unit. Then an overall health percentage evaluation model for satellite electrical power system was built. To obtain the accurate quantity for system health percentage, an automatic feedback closed-loop correction method for all coefficients in the evaluation model was present. The evaluation outputs could be referred as taking earlier fault-forecast and interventions for Ground Control Center or Satellites self.Keywords: satellite electrical power system, health percentage, linear stresses accumulation damage, evaluation model
Procedia PDF Downloads 4115398 Oil Exploitation, Environmental Injustice and Decolonial Nonrecognition: Exploring the Historical Accounts of Host Communities in South-Eastern Nigeria
Authors: Ejikeme Johnson Kanu
Abstract:
This research explores the environmental justice of host communities in south-eastern Nigeria whose source of livelihood has been destroyed due to oil exploitation. Environmental justice scholarship in the area often adopts Western liberal ideology from a more macro level synthesis (Niger Delta). This study therefore explored the sufficiency or otherwise of the adoption of Western liberal ideology in the framing of environmental justice (EJ) in the area which neglects the impact of colonialism and cultural domination. Mixed archival research supplemented by secondary analysis guided this study. Drawing from data analysis, the paper first argues that micro-level studies are required to either validate or invalidate the studies done at the macro-level (Niger Delta) which has often been used to generalise around environmental injustice done within the host communities even though the communities (South-eastern) differ significantly from (South-south) in terms of language, culture, socio-political and economic formation which indicate that the drivers of EJ may differ among them. Secondly, the paper argues that EJ framing from the Western worldview adopted in the study area is insufficient to understand environmental injustice suffered in the study area and there is the need for environmental justice framing that will consider the impact of colonialism and nonrecognition of the cultural identities of the host communities which breed environmental justice. The study, therefore, concludes by drawing from decolonial theory to consider how the framing of EJ would move beyond the western liberal EJ to Indigenous environmental justice.Keywords: environmental justice, culture, decolonial, nonrecognition, indigenous environmental justice
Procedia PDF Downloads 1385397 Origin of Hydrogen Bonding: Natural Bond Orbital Electron Donor-Acceptor Interactions
Authors: Mohamed Ayoub
Abstract:
We perform computational investigation using density functional theory, B3LYP with aug-cc-pVTZ basis set followed by natural bond orbital analysis (NBO), which provides best single “natural Lewis structure” (NLS) representation of chosen wavefunction (Ψ) with natural resonance theory (NRT) to provide an analysis of molecular electron density in terms of resonance structures (RS) and weights (w). We selected for the study a wide range of gas phase dimers (B…HA), with hydrogen bond dissociation energies (ΔEB…H) that span more than two orders of magnitude. We demonstrate that charge transfer from a donor Lewis-type NBO (nB:) to an acceptor non-Lewis-type NBO (σHA*) is the primary cause for H-bonding not classical electrostatic (dipole-dipole or ionic). We provide a variety of structure, and spectroscopic descriptors to support the conclusion, such as IR frequency shift (ΔνHA), H-bond penetration distance (ΔRB..H), bond order (bB..H), charge-transfer (CTB→HA) and the corresponding donor-acceptor stabilization energy (ΔE(2)).Keywords: natural bond orbital, hydrogen bonding, electron donor, electron acceptor
Procedia PDF Downloads 4385396 Drug Delivery of Cyclophosphamide Functionalized Zigzag (8,0) CNT, Armchair (4,4) CNT, and Nanocone Complexes in Water
Authors: Morteza Keshavarz
Abstract:
In this work, using density functional theory (DFT) thermodynamic stability and quantum molecular descriptors of cyclophoshphamide (an anticancer drug)-functionalized zigzag (8,0) CNT, armchair (4,4) CNT and nanocone complexes in water, for two attachment namely the sidewall and tip, is considered. Calculation of the total electronic energy (Et) and binding energy (Eb) of all complexes indicates that the most thermodynamic stability belongs to the sidewall-attachment of cyclophosphamide into functional nanocone. On the other hand, results from chemical hardness show that drug-functionalized zigzag (8,0) and armchair (4,4) complexes in the tip-attachment configuration possess the smallest and greatest chemical hardness, respectively. By computing the solvation energy, it is found that the solution of the drug and all complexes are spontaneous in water. Furthermore, chirality, type of nanovector (nanotube or nanocone), or attachment configuration have no effects on solvation energy of complexes.Keywords: carbon nanotube, drug delivery, cyclophosphamide drug, density functional theory (DFT)
Procedia PDF Downloads 3705395 Social and Digital Transformation of the Saudi Education System: A Cyberconflict Analysis
Authors: Mai Alshareef
Abstract:
The Saudi government considers the modernisation of the education system as a critical component of the national development plan, Saudi Vision 2030; however, this sudden reform creates tension amongst Saudis. This study examines first the reflection of the social and digital education reform on stakeholders and the general Saudi public, and second, the influence of information and communication technologies (ICTs) on the ethnoreligious conflict in Saudi Arabia. This study employs Cyberconflict theory to examine conflicts in the real world and cyberspace. The findings are based on a qualitative case study methodology that uses netnography, an analysis of 3,750 Twitter posts and semi-structural interviews with 30 individuals, including key actors in the Saudi education sector and Twitter activists during 2019\2020. The methods utilised are guided by thematic analysis to map an understanding of factors that influence societal conflicts in Saudi Arabia, which in this case include religious, national, and gender identity. Elements of Cyberconflict theory are used to better understand how conflicting groups build their identities in connection to their ethnic/religious/cultural differences and competing national identities. The findings correspond to the ethnoreligious components of the Cyberconflict theory. Twitter became a battleground for liberals, conservatives, the Saudi public and elites, and it is used in a novel way to influence public opinion and to challenge the media monopoly. Opposing groups relied heavily on a discourse of exclusion and inclusion and showed ethnic and religious affiliations, national identity, and chauvinism. The findings add to existing knowledge in the cyberconflict field of study, and they also reveal outcomes that are critical to the Saudi Arabian national context.Keywords: education, cyberconflict, Twitter, national identity
Procedia PDF Downloads 1745394 Corporate Social Responsibility, Media Visibility and Performance of Firms Listed on Nairobi Securities Exchange, Kenya
Authors: Anne Kariuki, Kellen Kiambati
Abstract:
The broad objective of this study was to establish the mediating effect of media visibility on the relationship between corporate Social Responsibility (CSR) and the corporate performance of firms listed on the Nairobi Securities Exchange. The review of the literature provided conceptual and empirical gaps that formed the basis of the conceptual hypotheses. A survey questionnaire was distributed to the 50 heads of human resource departments in the different firms. A survey was conducted on fifty (50) companies listed on the Nairobi Securities Exchange. The study findings reported a significant relationship between CSR and non-financial performance and the mediating role of media visibility on the relationship between CSR and performance. The findings of the study support the signaling theory and stakeholder’s theory. Conclusively, CSR activities have an effect on media visibility, which in turn affects performance.Keywords: corporate social responsibility, media visibility, corporate performance, non-financial performance
Procedia PDF Downloads 515393 Virtual Reality as a Method in Transformative Learning: A Strategy to Reduce Implicit Bias
Authors: Cory A. Logston
Abstract:
It is imperative researchers continue to explore every transformative strategy to increase empathy and awareness of racial bias. Racism is a social and political concept that uses stereotypical ideology to highlight racial inequities. Everyone has biases they may not be aware of toward disparate out-groups. There is some form of racism in every profession; doctors, lawyers, and teachers are not immune. There have been numerous successful and unsuccessful strategies to motivate and transform an individual’s unconscious biased attitudes. One method designed to induce a transformative experience and identify implicit bias is virtual reality (VR). VR is a technology designed to transport the user to a three-dimensional environment. In a virtual reality simulation, the viewer is immersed in a realistic interactive video taking on the perspective of a Black man. The viewer as the character experiences discrimination in various life circumstances growing up as a child into adulthood. For instance, the prejudice felt in school, as an adolescent encountering the police and false accusations in the workplace. Current research suggests that an immersive VR simulation can enhance self-awareness and become a transformative learning experience. This study uses virtual reality immersion and transformative learning theory to create empathy and identify any unintentional racial bias. Participants, White teachers, will experience a VR immersion to create awareness and identify implicit biases regarding Black students. The desired outcome provides a springboard to reconceptualize their own implicit bias. Virtual reality is gaining traction in the research world and promises to be an effective tool in the transformative learning process.Keywords: empathy, implicit bias, transformative learning, virtual reality
Procedia PDF Downloads 1945392 How Envisioning Process Is Constructed: An Exploratory Research Comparing Three International Public Televisions
Authors: Alexandre Bedard, Johane Brunet, Wendellyn Reid
Abstract:
Public Television is constantly trying to maintain and develop its audience. And to achieve those goals, it needs a strong and clear vision. Vision or envision is a multidimensional process; it is simultaneously a conduit that orients and fixes the future, an idea that comes before the strategy and a mean by which action is accomplished, from a business perspective. Also, vision is often studied from a prescriptive and instrumental manner. Based on our understanding of the literature, we were able to explain how envisioning, as a process, is a creative one; it takes place in the mind and uses wisdom and intelligence through a process of evaluation, analysis and creation. Through an aggregation of the literature, we build a model of the envisioning process, based on past experiences, perceptions and knowledge and influenced by the context, being the individual, the organization and the environment. With exploratory research in which vision was deciphered through the discourse, through a qualitative and abductive approach and a grounded theory perspective, we explored three extreme cases, with eighteen interviews with experts, leaders, politicians, actors of the industry, etc. and more than twenty hours of interviews in three different countries. We compared the strategy, the business model, and the political and legal forces. We also looked at the history of each industry from an inertial point of view. Our analysis of the data revealed that a legitimacy effect due to the audience, the innovation and the creativity of the institutions was at the cornerstone of what would influence the envisioning process. This allowed us to identify how different the process was for Canadian, French and UK public broadcasters, although we concluded that the three of them had a socially constructed vision for their future, based on stakeholder management and an emerging role for the managers: ideas brokers.Keywords: envisioning process, international comparison, television, vision
Procedia PDF Downloads 1325391 Using Axiomatic Design for Developing a Framework of Manufacturing Cloud Service Composition in the Equilibrium State
Authors: Ehsan Vaziri Goodarzi, Mahmood Houshmand, Omid Fatahi Valilai, Vahidreza Ghezavati, Shahrooz Bamdad
Abstract:
One important paradigm of industry 4.0 is Cloud Manufacturing (CM). In CM everything is considered as a service, therefore, the CM platform should consider all service provider's capabilities and tries to integrate services in an equilibrium state. This research develops a framework for implementing manufacturing cloud service composition in the equilibrium state. The developed framework using well-known tools called axiomatic design (AD) and game theory. The research has investigated the factors for forming equilibrium for measures of the manufacturing cloud service composition. Functional requirements (FRs) represent the measures of manufacturing cloud service composition in the equilibrium state. These FRs satisfied by related Design Parameters (DPs). The FRs and DPs are defined by considering the game theory, QoS, consumer needs, parallel and cooperative services. Ultimately, four FRs and DPs represent the framework. To insure the validity of the framework, the authors have used the first AD’s independent axiom.Keywords: axiomatic design, manufacturing cloud service composition, cloud manufacturing, industry 4.0
Procedia PDF Downloads 1735390 A Multimodal Approach towards Intersemiotic Translations of 'The Great Gatsby'
Authors: Neda Razavi Kaleibar, Bahloul Salmani
Abstract:
The present study dealt with the multimodal analysis of two cinematic adaptations of The Great Gatsby as intersemiotic translation. The assessment in this study went beyond the faithfulness based on repetition, addition, deletion, and creation which limit the analysis from other aspects. In fact, this research aimed to pinpoint the role of multimodality in examining the intersemiotic translations of the novel into film by means of analyzing different applied modes. Through a qualitative type of research, the analysis was conducted based on the theory proposed by Burn as Kineikonic mode theory derived from the concept of multimodality. The results of the study revealed that due to the applied modes, each adaptation represents a sense and meaning different from the other one. Analyzing the results and discussions, it was concluded that not only the modes have an undeniable role in film adaptations, but rather multimodal analysis including different nonverbal modes can be a useful and functional choice for analyzing the intersemiotic translations.Keywords: cinematic adaptation, intersemiotic translation, kineikonic mode, multimodality
Procedia PDF Downloads 4215389 Spin-Polarized Structural, Electronic, and Magnetic Properties of Co and Mn-Doped CdTe in Zinc-Blende Phase
Authors: A.Zitouni, S.Bentata, B.Bouadjemi, T.Lantri, W. Benstaali, Z.Aziz, S.Cherid, A. Sefir
Abstract:
Structural, electronic, and magnetic properties of Co and Mn-doped CdTe have been studied by employing the full potential linear augmented plane waves (FP-LAPW) method within the spin-polarized density functional theory (DFT). The electronic exchange-correlation energy is described by generalized gradient approximation (GGA) as exchange–correlation (XC) potential. We have calculated the lattice parameters, bulk modulii and the first pressure derivatives of the bulk modulii, spin-polarized band structures, and total and local densities of states. The value of calculated magnetic moment per Co and Mn impurity atoms is found to be 2.21 µB for CdCoTe and 3.20 µB for CdMnTe. The calculated densities of states presented in this study identify the half-metallic of Co and Mn-doped CdTe.Keywords: electronic structure, density functional theory, band structures, half-metallic, magnetic moment
Procedia PDF Downloads 4665388 Factors of Social Network Platform Usage and Privacy Risk: A Unified Theory of Acceptance and Use of Technology2 Model
Abstract:
The trust and use of social network platforms by users are instrumental factors that contribute to the platform’s sustainable development. Studying the influential factors of the use of social network platforms is beneficial for developing and maintaining a large user base. This study constructed an extended unified theory of acceptance and use of technology (UTAUT2) moderating model with perceived privacy risks to analyze the factors affecting the trust and use of social network platforms. 444 participants completed our 35 surveys, and we verified the survey results by structural equation model. Empirical results reveal the influencing factors that affect the trust and use of social network platforms, and the extended UTAUT2 model with perceived privacy risks increases the applicability of UTAUT2 in social network scenarios. Social networking platforms can increase their use rate by increasing the economics, functionality, entertainment, and privacy security of the platform.Keywords: perceived privacy risk, social network, trust, use, UTAUT2 model
Procedia PDF Downloads 985387 Acceptance of Health Information Application in Smart National Identity Card (SNIC) Using a New I-P Framework
Authors: Ismail Bile Hassan, Masrah Azrifah Azmi Murad
Abstract:
This study discovers a novel framework of individual level technology adoption known as I-P (Individual- Privacy) towards Smart National Identity Card health information application. Many countries introduced smart national identity card (SNIC) with various applications such as health information application embedded inside it. However, the degree to which citizens accept and use some of the embedded applications in smart national identity remains unknown to many governments and application providers as well. Moreover, the previous studies revealed that the factors of trust, perceived risk, privacy concern and perceived credibility need to be incorporated into more comprehensive models such as extended Unified Theory of Acceptance and Use of Technology known as UTAUT2. UTAUT2 is a mainly widespread and leading theory existing in the information system literature up to now. This research identifies factors affecting the citizens’ behavioural intention to use health information application embedded in SNIC and extends better understanding on the relevant factors that the government and the application providers would need to consider in predicting citizens’ new technology acceptance in the future. We propose a conceptual framework by combining the UTAUT2 and Privacy Calculus Model constructs and also adding perceived credibility as a new variable. The proposed framework may provide assistance to any government planning, decision, and policy makers involving e-government projects. The empirical study may be conducted in the future to provide proof and empirically validate this I-P framework.Keywords: unified theory of acceptance and use of technology (UTAUT) model, UTAUT2 model, smart national identity card (SNIC), health information application, privacy calculus model (PCM)
Procedia PDF Downloads 4685386 United against Drugs: Divergent Counternarcotic Strategies of US Government Agencies in Afghanistan
Authors: Anthony George Armiger II
Abstract:
This paper focuses on the counternarcotic strategies of US government agencies in Afghanistan from 2001-2014. Despite a heavy US presence in the country, Afghanistan currently accounts for 80% of opium production worldwide and remains a key contributor to the global drug market. This paper argues that the divergent counternarcotic strategies of various US government agencies on the ground in Afghanistan are a product of the organizational differences amongst those agencies and that those differences can challenge the implementation of counternarcotics policies in Afghanistan. To gain a more in-depth perspective, this paper analyzes the counternarcotic strategies of two US government agencies in Afghanistan; the United States Department of Defense (DoD) and the Drug Enforcement Administration (DEA). Utilizing the framework of the organizational behavior model of organizational theory, this paper will highlight the varying organizational interests, opinions, standard operating procedures, and routines of both of the government agencies. The paper concludes with implications on counternarcotics, as well as the counterinsurgency in Afghanistan and provides recommendations for future research on foreign policy and counternarcotics.Keywords: Afghanistan, drug policy, organizational theory, United States foreign policy
Procedia PDF Downloads 3765385 The Connection between Qom Seminaries and Interpretation of Sacred Sources in Ja‘farī Jurisprudence
Authors: Sumeyra Yakar, Emine Enise Yakar
Abstract:
Iran presents itself as Islamic, first and foremost, and thus, it can be said that sharī’a is the political and social centre of the states. However, actual practice reveals distinct interpretations and understandings of the sharī’a. The research can be categorised inside the framework of logic in Islamic law and theology. The first task of this paper will be to identify how the sharī’a is understood in Iran by mapping out how the judges apply the law in their respective jurisdictions. The attention will then move from a simple description of the diversity of sharī’a understandings to the question of how that diversity relates to social concepts and cultures. This, of course, necessitates a brief exploration of Iran’s historical background which will also allow for an understanding of sectarian influences and the significance of certain events. The main purpose is to reach an understanding of the process of applying sources to formulate solutions which are in accordance with sharī’a and how religious education is pursued in order to become official judges. Ultimately, this essay will explore the attempts to gain an understanding by linking the practices to the secondary sources of Islamic law. It is important to emphasise that these cultural components of Islamic law must be compatible with the aims of Islamic law and their fundamental sources. The sharī’a consists of more than just legal doctrines (fiqh) and interpretive activities (ijtihād). Its contextual and theoretical framework reveals a close relationship with cultural and historical elements of society. This has meant that its traditional reproduction over time has relied on being embedded into a highly particular form of life. Thus, as acknowledged by pre-modern jurists, the sharī’a encompasses a comprehensive approach to the requirements of justice in legal, historical and political contexts. In theological and legal areas that have the specific authority of tradition, Iran adheres to Shīa’ doctrine, and this explains why the Shīa’ religious establishment maintains a dominant position in matters relating to law and the interpretation of sharī’a. The statements and interpretations of the tradition are distinctly different from sunnī interpretations, and so the use of different sources could be understood as the main reason for the discrepancies in the application of sharī’a between Iran and other Muslim countries. The sharī’a has often accommodated prevailing customs; moreover, it has developed legal mechanisms to all for its adaptation to particular needs and circumstances in society. While jurists may operate within the realm of governance and politics, the moral authority of the sharī’a ensures that these actors legitimate their actions with reference to God’s commands. The Iranian regime enshrines the principle of vilāyāt-i faqīh (guardianship of the jurist) which enables jurists to solve the conflict between law as an ideal system, in theory, and law in practice. The paper aims to show how the religious, educational system works in harmony with the governmental authorities with the concept of vilāyāt-i faqīh in Iran and contributes to the creation of religious custom in the society.Keywords: guardianship of the jurist (vilāyāt-i faqīh), imitation (taqlīd), seminaries (hawza), Shi’i jurisprudence
Procedia PDF Downloads 2235384 Applying Theory of Self-Efficacy in Intelligent Transportation Systems by Potential Usage of Vehicle as a Sensor
Authors: Aby Nesan Raj, Sumil K. Raj, Sumesh Jayan
Abstract:
The objective of the study is to formulate a self-regulation model that shall enhance the usage of Intelligent Transportation Systems by understanding the theory of self-efficacy. The core logic of the self-regulation model shall monitor driver's behavior based on the situations related to the various sources of Self Efficacy like enactive mastery, vicarious experience, verbal persuasion and physiological arousal in addition to the vehicle data. For this study, four different vehicle data, speed, drowsiness, diagnostic data and surround camera views are considered. This data shall be given to the self-regulation model for evaluation. The oddness, which is the output of self-regulation model, shall feed to Intelligent Transportation Systems where appropriate actions are being taken. These actions include warning to the user as well as the input to the related transportation systems. It is also observed that the usage of vehicle as a sensor reduces the wastage of resource utilization or duplication. Altogether, this approach enhances the intelligence of the transportation systems especially in safety, productivity and environmental performance.Keywords: emergency management, intelligent transportation system, self-efficacy, traffic management
Procedia PDF Downloads 244